Author:
Antoniades Demetris,Markatos Evangelos P.,Dovrolis Constantine
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Lecture Notes in Computer Science;A. Acquisti,2003
2. Antoniades, D., et al.: One-Click Hosting Services: A File-Sharing Hideout. In: Proceedings of the ACM/SIGCOMM conference on Internet Measurements (November 2009)
3. Athanasopoulos, E., Anagnostakis, K., Markatos, E.: Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. In: Proceedings of the 4th International Conference on Applied Cryptography and Network Security (June 2006)
4. Athanasopoulos, E., et al.: GAS: Overloading a File Sharing Network as an Anonymizing System. In: Proceedings of the 2nd International Workshop on Security (2007)
5. Barth, A., Jackson, C., Mitchell, J.: Robust Defenses for Cross-Site Request Forgery. In: Proceedings of the 15th ACM conference on Computer and Communications security (2008)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Using the Internet to Plan for Terrorist Attack;Improving the Safety and Efficiency of Emergency Services;2020
2. Internet Censorship detection: A survey;Computer Networks;2015-06
3. Using the Internet to Plan for Terrorist Attack;Combating Violent Extremism and Radicalization in the Digital Era